Tell me what to read to find out how hackers ensure the anonymity of their actions in the network

... what palyatsya as encrypted. The culture of hacking work I want to learn more.
Art fiction, something like Cryptonomicon, too, is interesting.
October 8th 19 at 01:03
10 answers
October 8th 19 at 01:05
And all the problems of erroneous understanding of the word "cabinetry". But really it's just the joiners higher qualification (unless it is "the village carpenter") and they just know what's going on inside (and outside) of the tree and know how to use it.

And read is about the treatment of the wood (real, not videos from YouTube), about the architecture of the glands, guidelines for maintenance of equipment and turning about the furniture you are going to do.

But most importantly — to understand and use in practice the knowledge.
I'm sorry, but you're a dunce. - Mackenzie.Durgan commented on October 8th 19 at 01:08
Join the "sorry") - Schuyler.Kertzmann97 commented on October 8th 19 at 01:11
Yeah, the architecture of the glands. - zackery.Bay commented on October 8th 19 at 01:14
October 8th 19 at 01:07
And all the problems of incorrect understanding of the word "hacker". But really it's just the it specialists of higher qualification (if it is not "melhacker") and they just know what's going on inside (and outside) of a computer and know how to use it.

And read is about system administration (real, not the courses from proprietarios), about the architecture of the glands, rfc communication protocols and about the device of the network in which security is to be maintained.
But most importantly — to understand and use in practice the knowledge.
Known to all the banal statements with pretensions to gravitas, and, moreover, absolutely useless. Any I agree on all points, but then it does not use. While it is possible to write in short — learn and perhaps the question itself will disappear.

Surprising number of people who have the liking of such empty answers. Hehe, probably the same fans to rant with fervor bulging eyes. Make no mistake about the usefulness of such responses. - Mackenzie.Durgan commented on October 8th 19 at 01:10
October 8th 19 at 01:09
< what palyatsya as encrypted.
Palatina usually either greed, or stupidity, or carelessness. And it is not strange then the luck factor is not a small role.
As encrypted, it is unfortunately the same single science, which is developing and growing... On any hacker site you will find some collections on this topic. But that would be about the work culture learn more probably would have dipped into this work, from articles and forums do not understand. What to read? But here is the problem, Unfortunately in Russian cult resources on this topic such as the first jacksona late nineties or early two thousandth as carderplanet is long gone and unlikely to appear more and a little bit of standing resources ever close, just in the last three years, more than a couple of dozen interesting sites fell into oblivion. This is unfortunately what is left. xakep.ru the website of the magazine of vigodarzere with 98-go year. Not a bad forum, but the main part komyuniti alas students. A lot of good articles and archives of the magazine. Well, zloy.bz probably the most powerful in Russian that stayed in the public...
Actually carding, phishing and hacking sites are not interested, I'm interested in how people manage to keep anonimnosti, intensely communicating groups of like-minded people. Take for example the group Anonymous, they somehow communicate with each other. Can not be to not used the Internet whether phones. Well, or may be anonymous their communication de facto is not.

Found mention that hackers love to chat in IRC channels. Probably meant a private server? Not public yet? Why IRC? - Mackenzie.Durgan commented on October 8th 19 at 01:12
Thank you for referring - Schuyler.Kertzmann97 commented on October 8th 19 at 01:15
October 8th 19 at 01:11
My Association with the hacker Linus Torvalds, Dennis Ritchie and Stroustrup by other equally significant people for Linux.

And this is — "I want to hack all, teach me how to calculate the IP, or at least just let the secret manual" as it is with someone else, and I want to say — young asshole)

Learn, absorb knowledge by the ton, and as above advised dokapyvayas to the smallest nuances of the process, then after a while it will shoot in the direction you want, but for now it's the influence of movies and anonymous, IMHO)
Learn, absorb... maybe... it will shoot
The same way for someone. But there are more effective and direct. - Mackenzie.Durgan commented on October 8th 19 at 01:14
Oh, well there's no magic pill the magic IRC chat or forum. All again myself, through cobiana, errors, years spent at the computer and the other side delights. It's like you don't want to hear, and waiting has the link?)) - Schuyler.Kertzmann97 commented on October 8th 19 at 01:17
If I was interested in how best to protect against attacks from the web server or that you can read about server security about BTC for a nice surprise, you would probably also invited me to gobinath and spending years behind a computer? There is in the nature of mana, explanatory books, articles and Yes, links.

And You have one versatile recipe that everyone has heard since kindergarten. In fact, if you say nothing, why not pass by? Good luck. - zackery.Bay commented on October 8th 19 at 01:20
And yet,
And this is — "I want to hack all, teach me how to calculate the IP, or at least just let the secret manual" as it is with someone else, and I want to say — young asshole)

Here is what You broadcast who is no relation to me or my question has not. It's Your fantasies that You have mothersole, and in turn You somehow to me. - herta_Kihn commented on October 8th 19 at 01:23
As asked and answered. In addition, the word hacker has a different meaning in addition to "cracker," etc. - herta_Kihn commented on October 8th 19 at 01:26
really response, though generalized, but correct. There are those who are attacked, are the ones who are protected. You can attack in a hundred different vectors. The one hand complex, on the other hand effective way if you need super privacy, to communicate outside the home, disposable cell phone, left the SIM. That is, if you're up for a crime. You have no problems, as long as you are not interested in. If you commit criminal acts, but you are simply not profitable to look for, I don't know the post extremist content or sites any break, you won't be missed, if you run into difficulty. Make a separate computer, or the V-world, leaving open only 1 port for your chat, 80 if a browser or some other software and carefully monitor the traffic that goes through it. The smaller areas of control, the easier to monitor their safety. Plus, to live in his hut, trying to have minimal contact with cameras on the streets. Remember looking for someone, physical security and identifica much more important than virtual. Banal move to the Baba Gale village will do more than a measure of protection ProgramName means. Again, all this is necessary, if you did something serious and people have taken you serious. Cops score as soon as I see that you are using the VPN sit, that's the beauty of our country to criminals. - herta_Kihn commented on October 8th 19 at 01:29
October 8th 19 at 01:13
< what palyatsya as encrypted.

If you seriously take, the chance to get away virtually no.
Of course will not save any of tor(see the relevant articles about the fake node), nor with the Somali VPN server. If all the time to access the Internet with a new SIM and a new IMEI or to go to a cafe with wi-fi, with regular attacks it's only prolonging the inevitable.
Let's go to the Internet for communication with a cellular or better with a public hotspot, the message to invest in cryptocotylar. Then we can all go out on you, if only to begin to unravel the tangle from the other end — with the recipient (web server, mailer, IM server). On the other way. So?

If you set each Wi-Fi session when the fake MAC, then how do you catch?.. After all, you can send messages on the go from the car or from a backpack for a couple of minutes.

Thor, as I understand it, can seriously complicate the task of your catch, and if you send a message in shirokanedai on the go, HOW can you calculate? - Mackenzie.Durgan commented on October 8th 19 at 01:16
Something tells me that everyone who goes to Somalia with a vpn server "on the control", whatever that means.

Besides, one server is not enough, need at least two different jurisdictions. Because untangling the tangle with the end of the first find the server which is directly on behalf of someone did something. And then the question — which of our citizens are in the last time I went to this server? So if there is no second (penultimate), which need to know from the logs that still need to get with the Somali ISP, the case seams. As I see it. - Schuyler.Kertzmann97 commented on October 8th 19 at 01:19
The whole chain very fast spins. Something someone need to ask only in the most extreme case. Even if you go to Internet from the machine, the location of the attacker is localized with some error, but more a matter of technology. All providers should SORM, intelligence agencies can somehow redirect\to listen to the traffic they have everything under the hood. Another thing is that you have to annoy in order for you took the FSB and not just the police out of control K. - zackery.Bay commented on October 8th 19 at 01:22
>The whole chain very fast spins.
enough to give the paw to the owners of the Somali VPN, and then wiscat with what dog - herta_Kihn commented on October 8th 19 at 01:25
Even if you go to Internet from the machine, the location of the attacker is localized with some error.
I understand that up to a hotspot is localized in an instant, but then what? If you use 10 different spots in different areas, HOW can we determine what kind of car/whose backpack led to the transfer. Even a known spot, let stand at the ready direction finders, for 2 minutes to remove the bearing, and to know who was leading the session did not seem real to me.

enough to give the paw to the owners of the Somali VPN, and then... Yes, I agree. So unleash the logs no problem. - herta_Kihn commented on October 8th 19 at 01:28
October 8th 19 at 01:15
You need to understand, not to know.
Knowledge many understanding units.
You need to understand without knowing?
Words have all but valuable units. - Mackenzie.Durgan commented on October 8th 19 at 01:18
October 8th 19 at 01:17
Two-way satellite Internet from the hut in the distant wilderness, it's pretty safe.

Pitfalls:
1. Expensive.
2. Need to get an account, sereveny someone else's name. And, considering that the users of such Internet little finding and the withdrawal of Akka seems a very difficult task.
3. Need to come up with a way to anonymously Deposit funds on the Internet.
Although here is a link to the first website on-demand "two-way satellite Internet":
There is also possibility of installation on mobile objects such as a car or ship.
Even in the wilderness not to leave. Enough constantly traveling within the coverage area of the satellite, from time to time crossing the borders of countries. However, you can even have multiple accounts for different satellites, the zones of the coatings which cover different parts of the Earth and going up and down. - Mackenzie.Durgan commented on October 8th 19 at 01:20
To travel and why? So there is a chance to light the car on any camera, if known about the area where he conducted the session.

How can I detect the work with a stationary node, if the satellite does not belong? Direction finders in orbit? Doubtful. - Schuyler.Kertzmann97 commented on October 8th 19 at 01:23
October 8th 19 at 01:19
Have blackhat's ethics and culture do not exist, unnecessary. For them, the important result that (today in most cases) brings them financial benefit. Tools and techniques for anonymization quite a lot. One of the most reliable to use as a mediator an infected you as a zombie machine, better chain. Trust the Torah and other anonymization no.
Have grayhat's seemed to have ethics, they notify owners of systems and manufacturers about the vulnerabilities found, but do not hesitate to publish (or sell) information about the vulnerability, not necessarily giving a time for correction.
Well whitehat's is the so — called ethical hackers, to preserve the closeness to the original "hacker". It security professionals, often working pentesters, security auditors, analysts and security.
One of the most reliable to use as a mediator an infected you as a zombie machine, better chain.
Uh? Heard about this opinion. I do not understand what reliability? From ISP zombies also has logs, which shows who it went and what it did. At going you can raise the logs already his ISP. Isn't it?

So far I came up with such a scenario, when your Trojan (disposable) on Zambi and sometimes goes on some random web site and reads a seemingly random page in search of you left attach instructions. After the execution of the instructions (send mail) to cut off the server enclosure and snowyprincess with zombakov. Something like this? Or you meant the other userkeys? - Mackenzie.Durgan commented on October 8th 19 at 01:22
your example is an excellent choice for control of a botnet (so they and work, actually), but not so good for targeted hacking, since need prompt feedback on your actions. - Schuyler.Kertzmann97 commented on October 8th 19 at 01:25
October 8th 19 at 01:21
Hmm, it seems by this question should take place not me))

I look at you expert, which protects the server from BTC for a nice surprise after reading a couple of articles, and the person who on this dog ate. In General, do not tell my Slippers article about "how to become a hacker")) And read the last, what was the meaning of this word originally, not the one who gave Hollywood, maybe then it won't be my "fancy")

Just your question is equivalent to a situation when a scientist will come to some sort of well-known research resource and will ask him to get the Nobel prize. But it is firmly convinced that nothing much needed, just all hiding from him the secret links and books on which he then quickly you'll learn... years... pfft... funny really, because for a week you can train?))
Don't need snobbery. The article is a good way to enter the subject. At least can be gleaned from them abbreviations and other names which have been and continue gugler. - Mackenzie.Durgan commented on October 8th 19 at 01:24
To distort and to think out of the interviewee it is Your style.
1. did You come up with and compare the specialist and a couple of articles I read.
2. it You own the idea of the article "how to become a hacker".
3. someone hides links and documents it's Your thought.
4. quickly over a week to learn all this, too, You come up with.
5. ridiculous "example" with a scientist and a Nobel prize? hmm... I don't understand how any of this relates to my question.

I asked what can be read on a certain subject, You my question something hurt, and You began to argue with an imaginary person, to give their own words and thoughts of mine and to refute them.

Calm down already, breathe out and spare me from your murky stream of consciousness. The case has nothing to say. - Schuyler.Kertzmann97 commented on October 8th 19 at 01:27
October 8th 19 at 01:23

Find more questions by tags Hacking